Cybersecurity

Defense

Filter By:

Type

Fellow

Research Team

Use comma-separated ID numbers for each author

Support the Hoover Institution

Join the Hoover Institution's community of supporters in advancing ideas defining a free society.

Support Hoover

In the News

How To Stop The Next "Huawei Moment"

quoting Jamil Jaffervia Axios
Thursday, May 2, 2019
The U.S. is having a "Huawei moment," as security concerns prompt the Trump administration to try to block allies from using 5G equipment produced by the Chinese company. But policymakers and experts also fear the U.S. is ill-prepared to challenge Chinese dominance in the next waves of technology — opening the U.S. to another round of national security worries.
In the News

Is There Such A Concept As ‘Cyber Deterrence?’

quoting Amy Zegartvia The Fifth Domain
Tuesday, April 30, 2019

As the U.S. Department of Defense increasingly worries about damage that could result from a massive cyberattack, national security leaders are debating the best strategy to prevent such incursions. Should they adopt a philosophy that aims to stop an attack of any kind or should they try to dissuade enemies from specifically pursuing a cyberattack?

Blank Section (Placeholder)

Henry Farrell & Abraham L. Newman on Of Privacy and Power

interview with Jack Farrell, Abraham L. Newmanvia Security by the Book
Tuesday, April 23, 2019

The Hoover Institution hosted "Security by the Book with Henry Farrell & Abraham L. Newman" on Tuesday, April 23, 2019 from 5:30 PM – 6:30 PM EST.

Featured

Offensive Cyber Operations In US National Security

by Amy Zegart, Herbert Lin, Bill Finanvia Brookings Institution
Friday, April 26, 2019

Hoover Institution fellows Amy Zegart and Herb Lin discusses their recent book Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations.

Blank Section (Placeholder)Analysis and Commentary

Cyberspectives: Fiona Cunningham On China And Cybersecurity

interview with Fiona Cunninghamvia Cyberspectives
Thursday, April 25, 2019

Stanford researcher Fiona Cunningham discusses cybersecurity and China.

Analysis and Commentary

On Risk Mitigation And Huawei: A Response

by Herbert Linvia Lawfare
Wednesday, April 24, 2019

Today, Lawfare published an article by Alexei Bulazel, Sophia d’Antoine, Perri Adams and Dave Aitel on “The Risks of Huawei Risk Mitigation” that seemingly disagrees with an earlier piece of mine on the topic. But apart from a bit of snark about my use of the confidentiality-integrity-availability (CIA) triad as a pillar of the security discussion and the definition of risk mitigation, I don’t disagree with anything in their piece and endorse almost all of it.

Featured

Elizabeth Cobbs: PBS Documentary Explores The Future Of Automation And The American Dream

interview with Elizabeth Cobbsvia The Show (KJZZ)
Tuesday, April 23, 2019

Hoover Institution fellow Elizabeth Cobbs discusses her and James Shelley's new PBS documentary, "Cyberwork and the American Dream."

Analysis and Commentary

Hazlett On Facebook And Privacy

by David R. Hendersonvia EconLog
Saturday, April 20, 2019

While Congress has been holding hearings, poking tech execs, and dancing the legislative Fandango, the marketplace has imposed actual sanctions. Between the time Facebook’s Cambridge Analytica scandal was revealed, March of last year, and March of this year, shareholders lost more than $61.6 billion adjusted for overall market (NASDAQ) fluctuations. In contrast, Sen. Wyden’s 4 percent fine—even if applied to global sales, and instantly—would whack just $2.2 billion from the Facebook moguls.

Analysis and Commentary

Don’t Acquire A Company Until You Evaluate Its Data Security

by Chirantan Chatterjee, D. Daniel Sokolvia Harvard Business Review
Tuesday, April 16, 2019

When Marriott International acquired Starwood in 2016 for $13.6 billion, neither company was awareof a cyber-attack on Starwood’s reservation system that dated back to 2014. The breach, which exposed the sensitive personal data of nearly 500 million Starwood customers, is a perfect example of what we call a “data lemon” — a concept drawn from economist George Akerlof’s work on information asymmetries and the “lemons” problem.

In the News

Former Top CIA Official Warns That U.S. Intel Faces "Moment Of Reckoning" After 2016 Failure

quoting Amy Zegartvia CBS News
Tuesday, April 16, 2019

The U.S. intelligence community's failure to grasp the magnitude of the social media influence campaign Russia waged ahead of the 2016 presidential election may be one harbinger of a larger and more complex set of challenges its agencies will face, according to a new essay co-authored by former CIA deputy director Michael Morell.

Pages

Watch the LiveStream!